107 research outputs found

    Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults

    Get PDF
    Retirement is a major life transition, which leads to substantial changes across almost all aspects of day-to-day life. Although this transition has previously been seen as the normative marker for entry into older adulthood, its influence on later life has remained relatively unstudied in terms of technology use and cybersecurity behaviours. This is problematic as older adults are at particular risk of becoming victims of cyber-crime. This study aimed to investigate which factors associated with the retirement transition were likely to increase vulnerability to cyber-attack in a sample of 12 United Kingdom based older adults, all of whom had retired within the past 5 years. Semi-structured, one to one interviews were conducted and subsequently analysed using thematic analysis. Six themes were identified referring to areas of loss in: social interaction, finances, day-to-day routine, feelings of competence, sense of purpose, and technology support structures. We discuss the implications of these losses for building cyber-resilience in retirees, with suggestions for future research

    Users' trust in information resources in the Web environment: a status report

    Get PDF
    This study has three aims; to provide an overview of the ways in which trust is either assessed or asserted in relation to the use and provision of resources in the Web environment for research and learning; to assess what solutions might be worth further investigation and whether establishing ways to assert trust in academic information resources could assist the development of information literacy; to help increase understanding of how perceptions of trust influence the behaviour of information users

    The onus on us? Stage one in developing an i-Trust model for our users.

    Get PDF
    This article describes a Joint Information Systems Committee (JISC)-funded project, conducted by a cross-disciplinary team, examining trust in information resources in the web environment employing a literature review and online Delphi study with follow-up community consultation. The project aimed to try to explain how users assess or assert trust in their use of resources in the web environment; to examine how perceptions of trust influence the behavior of information users; and to consider whether ways of asserting trust in information resources could assist the development of information literacy. A trust model was developed from the analysis of the literature and discussed in the consultation. Elements comprising the i-Trust model include external factors, internal factors and user's cognitive state. This article gives a brief overview of the JISC funded project which has now produced the i-Trust model (Pickard et. al. 2010) and focuses on issues of particular relevance for information providers and practitioners

    Helping UNIX users : an assessment of the effectiveness of various forms of online help

    Get PDF
    The aim of online help is to make complex computer systems more usable and allow users to exploit more of the system’s power. To achieve this aim it is necessary to provide users with information needed to accomplish their currant task while also encouraging further skill development to facilitate the transition from novice to expert. This thesis investigates the relationship of individual differences to the use of computers and online help. An observational study of real users of UNIX showed that very few commands were used by users and there was great variability in the use of UNIX. “Field Dependency” was identified as a potential source of the variation between users. Two experiments were carried out to assess the effect of Field Dependency. The subjects were required to carry out a number of tasks with help provided via a human expert or an online help system. The help system developed could be configured to behave actively or passively. Two different user communities, computer science students and women trainees, were studied. Both experiments found Field Dependency to be correlated with the number of commands known by users: the more field -independent a user, the more commands are known. In the first experiment it was found that field-dependents were exposed to more help from the human expert than the field-independents. With the help system, the field-independents were exposed to more help. Field-independents were also found to benefit from increased flexibility of the system where both active and passive help was available whereas field-dependents did not.Conclusions are drawn about the effects of Field Dependency on user interaction with help systems and the effectiveness of two alternative access initiatives

    Barriers to older adults’ uptake of mobile-based mental health interventions

    Get PDF
    Background To address increasing demand of mental healthcare treatments for older adults and the need to reduce delivery costs, healthcare providers are turning to mobile applications. The importance of psychological barriers have been highlighted in the uptake of mobile-based mental health interventions and efforts have been made to identify these barriers in order to facilitate initial uptake and acceptance. However, limited research has focused on older adults’ awareness of these applications and factors that might be hindering their use. Objective The purpose of this study was to explore the perceived barriers that older adults experience in the uptake of mobile-based mental health interventions. Methods Semi-structured interviews were conducted with a sample of 10 older adults, 50 years or older (female = 7, mean age = 68 years), who experienced periods of low mood. National Health Service applications were demonstrated to facilitate conversation and explore participants’ understanding of mental health and mobile-based mental health interventions. Thematic analysis was used to analyse the interview transcripts. Results The social ecological model was adopted as an organising framework for the thematic analysis which identified six distinct barriers to older adults’ uptake of mobile-based mental health interventions: mental electronic-health (e-health) awareness, interaction with technology, discontinuation, ‘seeing’ facilitates therapeutic alliance, incongruent role of the general practitioner and privacy and confidentiality. Conclusions Older adults experience a number of barriers to uptake ranging from the individual level to a macro, organisational level. The practical implications of these barriers are discussed such as the need for increased awareness of mobile-based mental health interventions among older adults

    Cybersecurity in healthcare: A narrative review of trends, threats and ways forward

    Get PDF
    Electronic healthcare technology is prevalent around the world and creates huge potential to improve clinical outcomes and transform care delivery. However, there are increasing concerns relating to the security of healthcare data and devices. Increased connectivity to existing computer networks has exposed medical devices to new cybersecurity vulnerabilities. Healthcare is an attractive target for cybercrime for two fundamental reasons: it is a rich source of valuable data and its defences are weak. Cybersecurity breaches include stealing health information and ransomware attacks on hospitals, and could include attacks on implanted medical devices. Breaches can reduce patient trust, cripple health systems and threaten human life. Ultimately, cybersecurity is critical to patient safety, yet has historically been lax. New legislation and regulations are in place to facilitate change. This requires cybersecurity to become an integral part of patient safety. Changes are required to human behaviour, technology and processes as part of a holistic solution

    Reach modelling for drive-up self-service

    Get PDF
    People using a self-service terminal such as an automated teller machine (ATM) tend to adjust their physical position throughout a transaction. This is particularly apparent with terminals that are designed to be used from a vehicle (i.e. drive up automated teller machines or ATMs). Existing predictive tools tend to focus on static reach and provide limited predictions for how far people are willing to stretch to complete a task. Drive-up self-service products have 3 main challenges: the variability of vehicles, people and driver behaviour. Such conventional tools are therefore of limited use in understanding how much people are willing to move to use a self-service terminal. Work is described to build in-house predictive models based on 2 large empirical studies of reach in a drive up installation. These 2 studies assessed comfortable and extended reach from 10 vehicle categories. Extended reach was defined as stretching/leaning as far as participants would normally be willing to in order to complete a drive-up transaction. Findings from these studies indicated that participants are prepared to adopt more extreme postures at drive-up than in other situations with extended reach at drive-up being significantly different to what might be seen at a walk-up kiosk

    Unpacking security policy compliance: The motivators and barriers of employees’ security behaviors

    Get PDF
    The body of research that focuses on employees’ information Security Policy compliance is problematic as it treats compliance as a single behavior. This study explored the underlying behavioral context of information security in the workplace, exploring how individual and organizational factors influence the interplay of the motivations and barriers of security behaviors. Investigating factors that had previously been explored in security research, 20 employees from two organizations were interviewed and the data was analyzed using framework analysis. The analysis indicated that there were seven themes pertinent to information security: Response Evaluation, Threat Evaluation, Knowledge, Experience, Security Responsibility, Personal and Work Boundaries, and Security Behavior. The findings suggest that these differ by security behavior and by the nature of the behavior (e.g. on- and offline). Conclusions are discussed highlighting barriers to security actions and implications for future research and workplace practice

    Can We Fight Social Engineering Attacks By Social Means? Assessing Social Salience as a Means to Improve Phish Detection

    Get PDF
    Phishing continues to be a problem for both individuals and organisations, with billions of dollars lost every year. We propose the use of nudges – more specifically social saliency nudges that aim to highlight important information to the user when evaluating emails. We used a signal detection analysis to assess the effects of both sender saliency (highlighting important fields from the sender) and receiver saliency (showing numbers of other users in receipt of the same email). Sender saliency improved phish detection but did not introduce any unwanted response bias. Users were asked to rate their confidence in their own judgements and these confidence scores were poorly calibrated with actual performance, particularly for phishing (as opposed to genuine) emails. We also examined the role of impulsive behaviour on phish detection, concluding that those who score highly on dysfunctional impulsivity are less likely to detect the presence of phishing emails

    The Workplace Information Sensitivity Appraisal (WISA) scale

    Get PDF
    Human error in security plays a significant role in the majority of cyber-attacks on businesses. Security behaviours are impacted by numerous factors, including individual perceptions of information sensitivity. However, there is currently a lack of empirical measurement of information sensitivity and its role in determining security behaviours. This research presents a measure of information sensitivity appraisal that predicts security behaviour. We outline the design, development and validation of the Workplace Information Sensitivity Appraisal scale. The psychometric properties were assessed with data from an online sample of 326 employees in the UK. The scale comprises of five subscales: Privacy, Worth, Consequences, Low proximity interest by others and High proximity interest by others. The final 16-item WISA scale, alongside its five subscales, represents a comprehensive measure of information sensitivity appraisal in the workplace. The WISA scale has been found to have strong factorial validity, confirmed across eight information types, strong content validity, good criterion-related validity, adequate discriminant validity, and high internal reliability. This research utilised the WISA scale to explore sensitivity differences across eight information types: four concerning living individuals (Personal, Health, Financial & Lifestyle) and four organisationally-focused information types (IP, day to day, commercial & HR). Financial information was found to have the highest ratings for overall sensitivity followed by health and HR. Finally, scores for the WISA scale predicted a range of security behaviours including password usage, secure Wi-Fi usage, physical security and avoiding security risks. This demonstrates the potential role for information sensitivity appraisal as a determinant of security behaviours
    • 

    corecore